Digital Library
Search: "[ author: 김광조 ]" (10)
Scalable P2P Botnet Detection with Threshold Setting in Hadoop Framework
Khalid Huseynov,
Vol. 25, No. 4, pp. 807-816,
Aug.
2015
10.13089/JKIISC.2015.25.4.807
Keywords: botnets, scalability, Hadoop, unsupervised detection
10.13089/JKIISC.2015.25.4.807
Keywords: botnets, scalability, Hadoop, unsupervised detection
Improved ID-based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider
Hye-Won Park,
Tomoyuki Asano,
Vol. 19, No. 5, pp. 25-34,
Oct.
2009
10.13089/JKIISC.2009.19.5.25
Keywords: AGKA, Group key agreement, ID-based, Impersonation
10.13089/JKIISC.2009.19.5.25
Keywords: AGKA, Group key agreement, ID-based, Impersonation
Analysis and Recovery of CIH virus
,
Vol. 9, No. 4, pp. 49-60,
Aug.
1999
10.13089/JKIISC.1999.9.4.49
Keywords: CIH virus, Anti-Virus, FAT32
10.13089/JKIISC.1999.9.4.49
Keywords: CIH virus, Anti-Virus, FAT32
Generallization of Semi-bent functions and their Construction Method
Sang-Woo Park,
Seong-Taek Chee,
Kwang-Jo Kim,
Vol. 6, No. 3, pp. 31-40,
Jun.
1996
10.13089/JKIISC.1996.6.3.31
10.13089/JKIISC.1996.6.3.31
On the Correlation Immune Functions and their Nonlinearity
Soo-Hak Sung,
Seong-Taek Chee,
Sang-Jin Lee,
Kwang-Jo Kim,
Vol. 6, No. 3, pp. 11-22,
Jun.
1996
10.13089/JKIISC.1996.6.3.11
10.13089/JKIISC.1996.6.3.11
On recursively extended Boolean functions
Seong-Taek Chee,
Sang-Jin Lee,
Kwang-Jo Kim,
Vol. 5, No. 1, pp. 3-16,
Feb.
1995
10.13089/JKIISC.1995.5.1.3
10.13089/JKIISC.1995.5.1.3